共 50 条
- [32] Distance-bounding proof of knowledge to avoid real-time attacks SECURITY AND PRIVACY IN THE AGE OF UBIQUITOUS COMPUTING, 2005, 181 : 223 - 238
- [33] Security Analysis of Two Distance-Bounding Protocols RFID SECURITY AND PRIVACY, 2012, 7055 : 94 - 107
- [34] The Swiss-Knife RFID Distance Bounding Protocol INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 98 - 115
- [35] An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 250 - +
- [36] Security Analysis of Two Distance-Bounding Protocols RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
- [40] By using time-stamped transition density ISCAS '97 - PROCEEDINGS OF 1997 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS I - IV: CIRCUITS AND SYSTEMS IN THE INFORMATION AGE, 1997, : 1528 - 1531